Sử dụng Worksheet 3,7 ở đây. Lựa chọn công nghệ làm bài tập ở nhà của bạn. Khi lựa chọn công nghệ, nghiên cứu một cách cẩn thận ba của chức năng xác thực được thực hiện và làm nổi bật điểm mạnh và điểm yếu. Hãy suy nghĩ về tương lai. | 116 Chapter 3 Life-Cycle Management Use Worksheet here. TECHNOLOGY SELECTION Do your homework. When selecting technology study carefully how each of the three authentication functions are performed and highlight strengths and weaknesses. Think about the future. Select technology that will not impede you significantly over time from integrating your authentication architecture to accommodate a common authentication mechanism at every layer of the security stack that is single sign-on across your security stack . Factor in ease of use. Design your authentication plan within the context of the people who work in your organization anticipate their willingness or lack thereof to adopt new authentication mechanisms. That means you must consider ease of use of the authentication mechanism and portability of authentication credentials as in things people remember versus things people must carry . Keep in mind that their willingness will be influenced by the effectiveness of your security sales pitch which we ll talk about in a moment. In any event decisions on authentication mechanisms must be made within the context of your impact analysis. As effective security planners it s balance that we re after balancing out business the reality that people are involved and technology. That is while user convenience is important so is maintaining sufficient security. A strong security mechanism that nobody uses is of course not helpful nor is a weak one that s highly convenient. IMPLEMENTATION Hope for the best plan for things to go wrong. The key to implementation is securing partitioning and backing up authentication-related server components. Take into account user needs and behavior. What will you do if a user loses his or her username password or is locked out due to too many incorrect authentication attempts performed by the user or a hacker Be sure to address implementation fundamentals such as authentication credential recovery. Using the Security Plan Worksheets The .